• 2025
  • April - 6 articles
  • March - 14 articles
  • February - 16 articles
  • January - 15 articles
  • 2024
  • December - 15 articles
  • November - 15 articles
  • October - 20 articles
  • September - 17 articles
  • August - 20 articles
  • July - 18 articles
  • June - 20 articles
  • May - 22 articles
  • April - 12 articles
  • March - 14 articles
  • February - 13 articles
  • January - 11 articles
  • 2023
  • December - 12 articles
  • November - 12 articles
  • October - 16 articles
  • September - 11 articles
  • August - 13 articles
  • July - 13 articles
  • June - 13 articles
  • May - 12 articles
  • April - 11 articles
  • March - 15 articles
  • February - 12 articles
  • January - 13 articles
  • 2022
  • December - 14 articles
  • November - 12 articles
  • October - 11 articles
  • September - 12 articles
  • August - 13 articles
  • July - 13 articles
  • June - 13 articles
  • May - 12 articles
  • April - 12 articles
  • March - 14 articles
  • February - 12 articles
  • January - 13 articles
  • 2021
  • December - 15 articles
  • November - 12 articles
  • October - 14 articles
  • September - 11 articles
  • August - 15 articles
  • July - 12 articles
  • June - 14 articles
  • May - 12 articles
  • April - 14 articles
  • March - 15 articles
  • February - 11 articles
  • January - 11 articles
  • 2020
  • December - 14 articles
  • November - 11 articles
  • October - 13 articles
  • September - 11 articles
  • August - 9 articles
  • July - 11 articles
  • June - 16 articles
  • May - 13 articles
  • April - 13 articles
  • March - 17 articles
  • February - 10 articles
  • January - 12 articles
  • 2019
  • December - 12 articles
  • November - 11 articles
  • October - 12 articles
  • September - 12 articles
  • August - 14 articles
  • July - 11 articles
  • June - 12 articles
  • May - 14 articles
  • April - 12 articles
  • March - 14 articles
  • February - 14 articles
  • January - 17 articles
  • 2018
  • December - 14 articles
  • November - 13 articles
  • October - 17 articles
  • September - 14 articles
  • August - 14 articles
  • July - 19 articles
  • June - 17 articles
  • May - 18 articles
  • April - 20 articles
  • March - 18 articles
  • February - 18 articles
  • January - 19 articles
  • 2017
  • December - 19 articles
  • November - 16 articles
  • October - 19 articles
  • September - 21 articles
  • August - 22 articles
  • July - 17 articles
  • June - 19 articles
  • May - 20 articles
  • April - 18 articles
  • March - 20 articles
  • February - 13 articles
  • January - 6 articles
  • 2016
  • December - 10 articles
  • November - 9 articles
  • October - 8 articles
  • September - 10 articles
  • August - 10 articles
  • July - 8 articles
  • June - 11 articles
  • May - 8 articles
  • April - 11 articles
  • March - 11 articles
  • February - 11 articles
  • January - 9 articles
  • 2015
  • December - 13 articles
  • November - 13 articles
  • October - 14 articles
  • September - 13 articles
  • August - 11 articles
  • July - 12 articles
  • June - 14 articles
  • May - 11 articles
  • April - 12 articles
  • March - 12 articles
  • February - 12 articles
  • January - 9 articles
  • 2014
  • December - 10 articles
  • November - 9 articles
  • October - 13 articles
  • September - 12 articles
  • August - 13 articles
  • July - 14 articles
  • June - 10 articles
  • May - 14 articles
  • April - 15 articles
  • March - 17 articles
  • February - 14 articles
  • January - 18 articles
  • 2013
  • December - 20 articles
  • November - 18 articles
  • October - 21 articles
  • September - 19 articles
  • August - 21 articles
  • July - 22 articles
  • June - 20 articles
  • May - 23 articles
  • April - 26 articles
  • March - 24 articles
  • February - 29 articles
  • January - 24 articles
  • 2012
  • December - 22 articles
  • November - 24 articles
  • October - 27 articles
  • September - 27 articles
  • August - 25 articles
  • July - 22 articles
  • June - 20 articles
  • May - 28 articles
  • April - 24 articles
  • March - 28 articles
  • February - 24 articles
  • January - 24 articles
  • 2011
  • December - 24 articles
  • November - 18 articles
  • October - 21 articles
  • September - 21 articles
  • August - 21 articles
  • July - 20 articles
  • June - 23 articles
  • May - 27 articles
  • April - 22 articles
  • March - 22 articles
  • February - 16 articles
  • January - 20 articles
  • 2010
  • December - 21 articles
  • November - 18 articles
  • October - 20 articles
  • September - 13 articles
  • August - 11 articles
  • July - 9 articles
  • June - 8 articles
  • May - 9 articles
  • April - 11 articles
  • March - 12 articles
  • February - 10 articles
  • January - 10 articles
  • 2009
  • December - 11 articles
  • November - 9 articles
  • October - 11 articles
  • September - 10 articles
  • August - 10 articles
  • July - 10 articles
  • June - 10 articles
  • May - 11 articles
  • April - 13 articles
  • March - 13 articles
  • February - 7 articles
  • January - 10 articles
  • 2008
  • December - 12 articles
  • November - 8 articles
  • October - 16 articles
  • September - 11 articles
  • August - 13 articles
  • July - 13 articles
  • June - 14 articles
  • May - 13 articles
  • April - 13 articles
  • March - 9 articles
  • February - 14 articles
  • January - 11 articles
  • 2007
  • December - 11 articles
  • November - 12 articles
  • October - 12 articles
  • September - 4 articles
  • August - 4 articles
  • July - 4 articles
  • June - 2 articles
  • May - 6 articles
  • April - 5 articles
  • March - 1 article
  • Friday, September 29, 2017

    Mobile apps cited in Deloitte trophy breach

    Security analysts criticized Deloitte Touche Tohmatsu Ltd. this week for failing to discover a security breach that reportedly occurred in 2016 and remained undetected until recently. The Guardian reported Sept. 25, 2017, that the breach may have compromised the firm's client email addresses. The incident is considered a trophy win for hackers and particularly embarrassing for Deloitte, a Big Four accounting firm and global cybersecurity consultancy.

    Believing multiple access points, including mobile apps, may have enabled hackers to gain access to Deloitte's network, analysts warned companies that process and store consumer data to use advanced security methods to restrict remote worker access to sensitive customer data.

    "One thing worth mentioning is that cyber attackers have migrated to mobile applications," said Michael Magrath, Director, Global Regulations & Standards at Vasco Data Security Inc. "Although convenient, mobile apps are typically developed with tight release cycles with user experience being most important and security not being the highest priority."

    Ray DeMeo, founder and Chief Operations Officer at Virsec Systems Inc., said most breaches don't target well-protected resources directly; they typically exploit ancillary applications and remote entry points. "Hackers always look for the weakest link: web server vulnerabilities, stolen credentials or malicious insiders to gain a foothold," he stated. "Once inside, it's far too easy for hackers to pivot between apps, escalate privileges and access valuable data. And in far too many cases, sensitive data is copied outside of protected systems and accessible to a wide range of insiders and applications; this is where most of the damage occurs."

    Monitor mobile apps

    Magrath recommended using application shielding or Runtime Application Self-Protection (RASP) technology to proactively manage the threat of sophisticated malware by effectively detecting and preventing fraudulent app activities before they can start. "As noted in the PwC and BAE Systems report, APT10 utilizes malware as part of its espionage activity," he added. "Hardening network access while failing to lockdown mobile apps will leave organizations exposed and may leave CDE [cardholder data environments] unprotected."

    DeMeo advised merchants and acquirers to keep online and business applications up to date and implement enhanced security measures ‒ that go beyond Payment Card Industry Data Security Standard (PCI DSS) requirements ‒ to protect all consumer information. "Any customer data should be encrypted whenever possible," he said. "Many businesses fall months behind on patching, needlessly exposing more data."

    Strengthen privacy laws

    Magrath emphasized the need for a risk-based, multilayered approach to security. "Identity management and access control are high on the list to protect CDE," he noted. "The PCI DSS provides a good baseline for security requirements as does the NIST CSF. Given the numerous cyberattacks on industries like banking, payment processors, credit reporting agencies and healthcare, I would argue that these industries are high risk."

    DeMeo expects the recent rash of cybersecurity breaches to lead to broader privacy measures. "The PCI DSS is very specific about protecting credit card numbers, but not intended to provide broader privacy protection for consumers," he said. "As we experienced with Equifax, enormous amounts of sensitive personal data can be breached that doesn't necessarily contain credit card numbers. If we're serious about broader privacy protection, we need to consider privacy laws as broad reaching as the European GDPR. It's unlikely that this will be done at the federal level, but increasingly, states are likely to start strengthening privacy laws."

    Editorial Note:

    Notice to readers: These are archived articles. Contact information, links and other details may be out of date. We regret any inconvenience.

    skyscraper ad